Midterm ISAM2
b. Dynamic NAT
A Certkiller router has been configured with the following command: IP nat pool nat-test 192.168.6.10 192.168.6.20 netmask 255.255.255.0 This is an example of what type of NAT? a. Static NAT b. Dynamic NAT c. Dynamic NAT with overload d. Port Address Translation e. None of the above
a) Before they are routed to an outbound interface.
A Cisco router is configured with an input ACL. When are packets processed for this ACL? a) Before they are routed to an outbound interface. b) After they are routed for outbound interface. c) Before the frame enters the inbound interface. d) Before and after they are routed to an outbound interface. e) None of the above is correct.
b) A static route to network 192.168.111.0/24
A Router R1 receives information about a remote network 192.168.111.0/24 from multiple sources. What will R1 consider the most reliable information about the path to that network? a) An OSPF update for network 192.168.111.0/24 b) A static route to network 192.168.111.0/24 c) A RIP update for network 192.168.111.0/24 d) An EIGRP update for network 192.168.111.0/24 e) None of the above
e) It creates a one-to-one mapping between an inside local address and outside global address
A network administrator uses the Cisco command "ip nat inside source static 172.25.10.5 201.202.203.204" while configuring a router. What does this command accomplish? a) It creates an address pool for all outside NAT translations. b) It creates dynamic source translations for all inside local PAT transactions. c) It creates the source addresses of two PCs statically in the router ARP table. d) It maps one inside source address to a dynamic range of public address beginning. e) It creates a one-to-one mapping between an inside local address and outside global address
a. Switch1(config-if)# switchport port-security violation protect d. Switch1(config-if)# switchport port-security mac-address address-id
A network security policy requiring that the switch interface manually sets the device address and if the policy is violated, the interface should protected. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two) a. Switch1(config-if)# switchport port-security violation protect b. Switch1(config-if)# switchport port-security mac-address sticky c. Switch1(config-if)# switchport port-security maximum 1 d. Switch1(config-if)# switchport port-security mac-address address-id e. Switch1(config-if)# switchport port-security violation restrict
a) 192.168.10.224/28
A new subnet with 12 host has to be added to the network shown below at the router R4. Which one of the given subnet address choices should be used for this new subnet in order to waste the fewest number of IP addresses? a) 192.168.10.224/28 b) 192.168.10.208/28 c) 192.168.10.208/29 d) 192.168.10.200/28 e) None of the above
b) RIPv2
A small company with headquarters in Houston and with three additional locations in Texas has acquired the Class C IP address 192168.10.0/24 which is to be used in its network shown below. The four locations have the given number of host counts as shown in the figure. The company uses two different brands of routers in the given network. Based on the given information, which routing protocol will be the most suitable to use? a) RIPv1 b) RIPv2 c) IGRP d) EIGRP e) Both b and d can be used in the network
e. Switch SWD
A switched LAN is shown below. The printers shown are attached to the hub in the access layer. All connections are 100 Mbps connections. Based on the information given in the figure, which device will provide the spanning-tree designated port role for the network segment that services the printers? a. Switch SWA b. Hub E c. Switch SWC d. Switch SWB e. Switch SWD
e) None of the above is correct
According to the routing table or R1 show below, how does R1 send a packet destined to the IP address 192.168.1.125? a) Via FastEthernet0/0 interface b) Via Serial0/0 interface c) Via Serial0/1 interface d) Via FastEthernet0/1 interface e) None of the above is correct
d) The network administrator should configure an administrative distance for RIP that is lower than the administrative distance of OSPF
Assume that a router learns two routes to a remote network, one route via OSPF and one route via RIPv2. The network administrator wants the router to use the route learned via RIPv2. How should the network administrator configure the router to ensure that the router will use the route learned via RIPv2? a) Nothing. The router will automatically use routes learned via RIP over routes learned via OSPF b) The network administrator should configure the routers along the OSPF path with lower priority numbers c) The network administrator should configure the router interface on the OSPF path to be a passive interface d) The network administrator should configure an administrative distance for RIP that is lower than the administrative distance of OSPF e) If two paths exist to a remote network, the only way to force the router to prefer one path over the other is to configure the preferred path as a static route
a. Switch SW5
Assume that in the network below, most of time the traffic from PCs in the given VLAN is directed to the servers on the the same VLAN. Under this assumption, which switch will be the preferred root switch for VLAN 20? a. Switch SW5 b. Switch SW2 c. Switch SW4 d. Switch SW1 e. Switch SW3
c. Show ip interface
Assume that you have applied an IP access control list to Router R2. You want to check the placement and direction of the access control list. Which command should you use? a. Show access-list b. Show ip access-list c. Show ip interface d. Show interface e. None of the above
a) The 10.10.10.8 network is three hops away from this router e) This router is using RIP as the routing protocol
At a router show ip route command is issued. One of the lines of the output of this command is shown below. What can be determined from the "show ip route" command output given below? (Choose two answers) a) The 10.10.10.8 network is three hops away from this router b) The next routing update can be expected in 35 seconds c) The IP address 10.10.10.6 is configured on S0/1 d) The IP address 10.10.10.8 is configured on S0/1 e) This router is using RIP as the routing protocol
b. It is the sum of the costs based on bandwidth
By default, which of the following factors determines the spanning-tree path cost? a. It is the individual link cost based on latency b. It is the sum of the costs based on bandwidth c. It is the total hop count d. It is dynamically determined based on load e. None of the above
c) The path will be from R3 to R1
CHECK e) Both "c" and "a" above are correct In the following network a Cisco proprietary dynamic routing protocol is used. Based on the information provided in the output of show ip route command given below, what will be the path the packets follow from a host on subnet attached to R3 fa0/0 interface to the subnet 192.168.10.64/26? a) The path will be from R3 to R2 to R1 b) The path will be from R3 to R1 to R2 c) The path will be from R3 to R1 d) Both "a" and "b" above are correct e) Both "c" and "a" above are correct
e) None of the above answers is correct
Consider the following configuration commands issued at router R7. On which interfaces does R7 will send and receive RIPv2 updates? a) On fa0/0 interface b) On fa0/0 and fa0/1 interface c) On fa0/0, fa0/1 and s0/0 interface d) On fa0/0 and s0/0 interface e) None of the above answers is correct
d) To translate hosts on two subnets on fa0/0 and fa0/1 to a single IP address for Internet access.
Consider the network given below. Two subnets 172.16.1.0/24 and 172.16.2.0/24 are attached to R1 fa0/0 and fa0/1 interfaces. What will be the purpose of the configuration statements given on the right side? a) To provide security on fa0/0 and fa0/1 through application of an ACL. b) To translate internal address of each host on two subnets to unique public IP address. c) To allow hosts on each subnets to access the computers on the other subnet. d) To translate hosts on two subnets on fa0/0 and fa0/1 to a single IP address for Internet access.
e) To prevent students connected to SW2 from accessing the command prompt at R1
Consider the network shown below. What is the purpose of the given three configuration commands? R1(Config)# access-list 15 permit 10.1.1.0 0.0.0.255 R1(Config)# line vty 0 4 R1(Config-line)# access-class 15 in a) To allow 10.1.1.0/24 network access the Internet b) To prevent students from accessing the Internet c) To allow students to access the Internet d) To prevent students from accessing 10.1.1.0/24 subnet e) To prevent students connected to SW2 from accessing the command prompt at R1
b) 172.31.55.55
Router R1 was just powered up. Based on the information shown below, what is the OSPF Router ID for R1? a) 172.16.0.3 b) 172.31.55.55 c) 172.16.3.1 d) 172.16.0.0 e) None of the above is correct.
b. The 802.1d protocol is enabled on the switch e. Port 16 is the root port and port 21 is the redundant link
Examine the output of the spanning-tree command shown, and indicate what can be determined about the switch configuration. (Choose all valid answer choices) a. This switch is the root bridge for VLAN 1 b. The 802.1d protocol is enabled on the switch c. This switch is connected to port 16 on the root bridge d. The switches are using Rapid Spanning Tree Protocol e. Port 16 is the root port and port 21 is the redundant link
c) The packet carrying ICMP message will be routed out of s0/1 interface
Exhibits below show partial outputs of show running-config and show ip route commands at a router R1. Assume that a PC with the IP address 10.1.6.100 pings the IP address 10.1.8.55. How will this packet be processed by the router R1? a) The packet carrying ICMP message will be routed out of s0/0 interface b) The packet carrying ICMP message will be routed out of fa0/0 interface c) The packet carrying ICMP message will be routed out of s0/1 interface d) The packet carrying ICMP message will be routed out of fa0/1 interface e) None of the above is true
c) The packet carrying ICMP message will be routed out of s0/1 interface
Exhibits below show partial outputs of show running-config and show ip route commands at a router R1. Assume that a PC with the IP address 10.1.6.100 pings the IP address 10.1.8.55. How will this packet be processed by the router R1? a) The packet carrying ICMP message will be routed out of s0/0 interface b) The packet carrying ICMP message will be routed out of fa0/0 interface c) The packet carrying ICMP message will be routed out of s0/1 interface d) The packet carrying ICMP message will be routed out of fa0/1 interface e) None of the above is true
c) The highest IP address of any logical interface
On a router configured with OSPF which has physical and loopback (logical) interfaces, which of the following factors determine the Router ID when interface priorities are all default values? a) The lowest IP address of any interface b) The highest IP address of any interface c) The highest IP address of any logical interface d) The middle IP address of any logical interface e) The lowest IP address of any physical interface
a) R2 is configured to send only RIPv1 updates
For the shown network below, output of show ip route command is displayed under the network diagram. There is a disparity between the output of this command and the subnetworks shown in the network diagram. What would be the most likely reason for this disparity? a) R2 is configured to send only RIPv1 updates b) R1 is configured to receive only RIPv1 updates c) R2 is configured to send both RIPv1 and RIPv2 updates d) R1 is configured to receive only RIPv2 updates e) R3 is configured to send and receive only RIPv1 updates
c) It should be configured on R1
ISAM5636 corporate network below uses private IP addresses in its five subnets. The company needs to use NAT/PAT to allow access to corporate servers from the Internet and also for access to the Internet by corporate client computers in all three corporate LANs. Where should NAT/PAT be configured on this network? a) It should be configured on all corporate routers b) It should be configured on R1 and R2 c) It should be configured on R1 d) It should be configured on R2 and R3 e) It should be configured on R3
e) root and designated
In IEEE 802.1w RSTP standard, which switch ports can forward traffic toward the root bridge? a) alternate and backup b) backup and designated c) designated and alternate d) backup and alternate e) root and designated
a) 10
In OSPF, if the bandwidth of an interface on a router is configured with the bandwidth 10000 command, what would be the calculated cost of the link? a) 10 b) 1 c) 100 d) 1500 e) None of the above
e) ip route 0.0.0.0 0.0.0.0 172.16.2.1
In a Cisco router which one of the following commands set the gateway of last resort? a) ip default-gateway 0.0.0.0 b) ip default-route 0.0.0.0 0.0.0.0 172.16.2.1 c) ip route 172.16.2.1 0.0.0.0 0.0.0.0 d) ip default-network 0.0.0.0 e) ip route 0.0.0.0 0.0.0.0 172.16.2.1
a. Router R1 is connected to more than one multi-access network
In a Cisco router, R1, show ip ospf neighbor command is issued and the following output is obtained. Why are there two designated routers identified in this output? a. Router R1 is connected to more than one multi-access network b. The router 208.149.23.30 is a secondary designated router in case the primary fails c. There are multiple DRs because DR election is still underway d. Routers have all same priorities and therefore they are tied in DR election e. Because the designated router election process has not completed yet
a. Path cost
In a switch which may have multiple paths to reach to the root bridge, what value primarily determines which port becomes the root port on this switch in a switched network with spanning-tree? a. Path cost b. Lowest port MAC address c. VTP revision number d. Highest port priority number e. Port priority number and MAC address f. None of the above
b. Lower the bridge priority on Switch 1.
In all of the switches in the network below are running IEEE 802.1d with its default settings. As a network administrator you realized that Switch 1 should be the root bridge. Which change will ensure that Switch 1 will be selected as the root bridge? a. Disable spanning tree on Switch 9. b. Lower the bridge priority on Switch 1. c. Lower the bridge priority on Switch 9. d. Raise the bridge priority on Switch 1. e. Raise the bridge priority on Switch 9. f. None of the above.
c) SW3, ports fa0/2 and fa0/3
In the Etherswitch network shown below no configuration has been done on any of the five switches and they are all in factory defaults. This means that the switches are running IEEE 802.1D STP protocol and they are configured for the default VLAN only. Based on the given information, which port(s) on which switch(es) will be in blocking mode? a) SW 3, port fa0/3 b) SW3, port fa0/4 c) SW3, ports fa0/2 and fa0/3 d) SW4, port fa0/3 e) None of the given choices is correct
c) Switch NG1 - port Fa1/3 and Switch NG2 - port Fa1/3
In the figure below, which ports can be configured with PortFast? a) Switch NG1 - port Fa1/2 and Switch NG2 - port Fa1/3 b) Switch NG2 - port Fa1/2 and Switch NG1 - port Fa1/1 c) Switch NG1 - port Fa1/3 and Switch NG2 - port Fa1/3 d) Switch NG1 - port Fa1/1 and Switch NG1 - port Fa1/3 e) None of the ports should use port fast
e) R2 fa0/0 out
In the following network, accounting department users should not be allowed to access Human Resources (HR) server. All the other traffic needs to be permitted to flow in the given network in either direction. With this goal in mind, the following access list is created: access-list 28 deny 192.168.16.128 0.0.0.31 access-list 28 permit any On which interface and in which direction should this access list be applied with the goal of minimally burdening the CPU of the router(s)? a) R1 s0/0 out b) R1 fa0/1 in c) R1 fa0/1 out d) R2 s0/1 in e) R2 fa0/0 out
c) The path will be from R3 to R1 to the host
In the following network, what will be the path the packets follow from R3 to a host with IP address 192.168.10.66? Note that routers are using the last usable addresses in Ethernet subnets. a) The path will be from R3 to R2 to R1 to the host b) The path will be from R3 to R1 to R2 to the host c) The path will be from R3 to R1 to the host d) Both "a" and "b" above are correct e) Both "c" and "a" above are correct
a. SWA - Fa0/0 b. SWA - Fa0/1 f. SWC - Fa0/1
In the given network below, which ports will be STP designated ports if all the links are operating at the same bandwidth (i.e. port costs are the same)? (Choose three) a. SWA - Fa0/0 b. SWA - Fa0/1 c. SWB - Fa0/0 d. SWB - Fa0/1 d. SWC - Fa0/0 f. SWC - Fa0/1
b) Combining routes to multiple networks into one supernet
On the topic of VLSM, which statement below best describes the concept of route aggregation summarization? a) Deleting unusable addresses through creation of many subnets b) Combining routes to multiple networks into one supernet c) Reclaiming unused space by means of changing the subnet size d) Calculating the available host addresses in the autonomous system e) None of the above is correct
a. blocking d. forwarding
Which two states are the port states when RSTP has converged? (choose two) a. blocking b. learning c. disabled d. forwarding e. listening
c) Use EIGRP as the routing protocol in the network instead of RIPv2 and use EIGRP load balancing methods
In the network given below, RIPv2 routing protocol is used. R1 routes packets from 10.3.1.0/24 subnet to 10.3.4.0/24 subnet via R2 using s0/0 interface. However, in few days, the company will install a new T1 link from R1 s0/1 interface to R3 s0/0 interface. With this new T1 link, the company would like to perform load balancing for packets packets from 10.3.1.0/24 subnet to 10.3.4.0/24 subnet using R1 s0/0 interface and also new s0/1 interface. You are asked to determine how to accomplish this goal. What would you do? a) Use OSPF as the routing protocol in the network instead of RIPv2 and use OSPF default load balancing methods b) Use RIPv1 as the routing protocol in the network and use RIPv1 load balancing methods c) Use EIGRP as the routing protocol in the network instead of RIPv2 and use EIGRP load balancing methods d) Keep using RIPv2 as the routing protocol in the network and use its default load balancing methods e) Use static routes with required load balancing settings
d. It should be applied to Line interface as input ACL.
In the network given below, Telnet access to router R1 needs to be allowed only from PC1. An access list is created with the command access-list 35 permit host 192.168.254.11. Which is the best interface to apply this access list to? a. It should be applied to S0/0 as output ACL. b. It should be applied to Fa0/0 as input ACL. c. It should be applied to Fa0/0 as output ACL. d. It should be applied to Line interface as input ACL. e. It should be applied to SW1 fa0/1 interface as input ACL.
d) The loopback IP address specifies the router ID for R2
In the network given below, which one of the choices is correct about the loopback IP address that is configured on R2? a) The loopback IP address indicates that R2 should be elected as DR b) The loopback IP address ensures that all LAN data will be forwarded to R2 c) The loopback IP address provides a backup role to the s0/0 address d) The loopback IP address specifies the router ID for R2 e) None of the above is correct
a) At router R1
In the network given below, you would like to implement NAT/PAT so that client computers can access the Internet and the Internet computer can access WEB, DNS and EMAIL servers. Where should NAT/PAT be configured in the given network? a) At router R1 b) At router R2 c) At router R3 d) At router R2 and R3 e) None of the given choices is correct
a) Spanning tree is not running on those switches Note: A lot of switch vendors disable STP by default. So out of the box, STP might need to be enabled.
In the network shown below no port aggregation is used. The network has been just powered on. At this time, both PC-A and PC-B send ARP requests to R1's IP address. Subsequently, the network performance deteriorates dramatically and also high number of broadcast frames are detected. What could have caused this issue? a) Spanning tree is not running on those switches b) The two PCs are on different subnets c) There is a mismatch in the VTP version running on two switches d) Router fa0/0 interface is in half duplex mode e) None of the above is correct
b) R1(config-router)# no auto-summary Note: By default, RIP will summarize groups of subnets into classful network routes. Disable automatic summarization with the no auto-summary configuration command.
In the network shown below routers R1 and R2 are configured for EIGRP. Hosts attached to the network on R1 are unable to reach hosts on the networks attached to R2. After inspecting R1 configurations, it was found that another command needs to be entered. Which of the following command should you enter? a) R1(config-router)# version 2 b) R1(config-router)# no auto-summary c) R1(config-router)# redistribute eigrp 75 d) R1(config-router)# EIGRP passive interface s0/0 e) R1(config-router)# default-information originate
b. SW1 - SW2 - SW4
In the network shown below, over which path will frames go from PC1 to PC2? a. SW1 - SW3 - SW4 b. SW1 - SW2 - SW4 c. SW1 - SW2 - SW3 - SW4 d. SW1 - SW3 - SW2 - SW4 e. None of the above
e) Routing protocol on R2 is using automatic route summarization Note: If enabled, EIGRP supports automatic summarization and will automatically advertise summary routes to other EIGRP routers.
In the network shown below, show ip route command is issued at R2 and the given output is observed. Main office network has subnet 172.16.1.0/24 as shown below. Why does this address appear with subnet mask /16 routing table? a) R1 has a static route configured for 172.16.0.0/16 network b) The routing protocol that is forwarding this route only sends classful updates c) The routing protocol on R1 is misconfigured d) R1 is configured to summarize on classful and classless boundaries e) Routing protocol on R2 is using automatic route summarization
b) R2
In the network shown below, show ip route command was issued from one of the routers and the output given below was displayed. Which one of the four routers produced this output? a) R1 b) R2 c) R3 d) R4 e) None of these router
b) R2
In the network shown below, show ip route command was issued from one of the routers in the network and the output given below was displayed. Which router produced this output? 10.0.0.0/30 is subnetted, 4 subnets O 10.10.10.8 [110/128] via 10.10.10.2, 00:02:44, Serial0/0 O 10.10.10.12 [110/128] via 10.10.10.6, 00:02:44, Serial0/1 C 10.10.10.0 is directly connected, Serial0/0 C 10.10.10.4 is directly connected, Serial0/1 C 192.168.1.0/24 is directly connected, FastEthernet0/0 192.168.2.0/24 [110/138] via 10.10.10.6, 00:02:44, Serial0/1 a) R1 b) R2 c) R3 d) R4 e) None of these routers
d) Only RIPv2, OSPF, EIGRP can be used
In the network shown below, the administrator is considering to use routing protocols RIPv1, RIPv2, OSPF and EIGRP. Which of these routing protocols can be used in this network? a) Only RIPv1, OSPF, EIGRP can be used b) Only RIPv1, EIGRP can be used c) Only RIPv1, OSPF can be used d) Only RIPv2, OSPF, EIGRP can be used e) Only OSPF, EIGRP can be used
d. 172.30.16.0 0.0.3.255
In the network shown below, the network administrator would like to permit only hosts on the 172.30.16.0/22 subnetwork to access to the Internet. Which IP address and wildcard mask combination should the network administrator use for this case? a. 172.30.0.0 0.0.1.255 b. 172.30.16.0 0.0.253.255 c. 172.30.16.0 0.0.7.255 d. 172.30.16.0 0.0.3.255 e. None of the above is correct
e) Non-broadcast multi-access networks and broadcast multi-access networks
On which types of networks does OSPF elect a backup designated router? a) Non-broadcast multipoint networks b) Point-to-point networks and multi-access networks c) Point-to-point networks only d) Point-to-point networks and serial link networks e) Non-broadcast multi-access networks and broadcast multi-access networks
e. The new rule will have no effect on network operation.
In the network shown below, the router R1 is operational with the shown ACL 106. R1 fa0/0 interface is assigned the IP address 192.168.254.1/24. Few days later, the network administrator adds another rule to the existing ACL 106 using the command line given below. What is the effect of this command on the router operation? R1(config)# access-list 106 deny tcp 192.168.254.0 0.0.0.127 any eq 80 a. Hosts on 192.168.254.0/25 part of the network will not be able to access Internet web servers. b. Only host 192.168.254.157 will be able to access internet web servers. c. None of the hosts will be able to access the internet web servers. d. Hosts on 192.168.254.128/25 subnet and host 192.168.254.157 will be able to access Internet web servers. e. The new rule will have no effect on network operation.
d) Use the command "ip route 192.168.0.0 255.255.252.0 10.1.0.2"
In the network shown below, what is the simplest way to establish a static route from R-SSB to Bayou and Delta hosts? a) Use the command "ip route 0.0.0.0 0.0.0.0 10.1.0.2" b) Use the command "ip route 192.168.0.0 255.255.255.0 10.1.0.2" c) Use the command "ip route 192.168.0.0 255.255.255.0 10.1.0.2" and "ip route 192.168.2.0 255.255.255.0 10.1.0.2" d) Use the command "ip route 192.168.0.0 255.255.252.0 10.1.0.2" e) None of the above commands will accomplish the desired task
c. fa0/1 on SW2
In the network shown below, which port in which switch will be in blocking mode? a. fa0/1 on SW1 b. fa0/2 on SW1 c. fa0/1 on SW2 d. fa0/2 on SW2 e. None of the given choices is correct
b) The frame travels from Switch 5 to Switch 6 to Switch 2 to Switch 1 to Switch 4 to PC4
In the switched network shown below, all of the switches are running IEEE 802.1d STP protocol. All the switches are configured for the default VLAN only. All of the bridge priorities are also set to default value of 32768. STP link costs for 10 Mbps links is 100, 100 Mbps is 19 and for 1 Gbps is 4. Based on the given information, how does a frame sent from PC-5 travel to PC4 in this network? a) The frame travels from Switch 5 to Switch 4 to PC 4 b) The frame travels from Switch 5 to Switch 6 to Switch 2 to Switch 1 to Switch 4 to PC4 c) The frame travels from Switch 5 to Switch 6 to Switch 3 to Switch2 to Switch 1 to Switch 4 to PC4 d) The frame travels from Switch 5 to Switch 6 to Switch 5 to Switch 4 to PC4 e) None of the above is correct
b) When a company connects to ISP, the ISP router can be configured with a static route for the company network
In which of the following cases the use of a static route will be the most suitable? a) In OSPF, all the routers other than the DR should be configured with static routes b) When a company connects to ISP, the ISP router can be configured with a static route for the company network c) In RIP networks, when a network is more than 15 hops away, a static route should be used d) When the administrative distance of the routing protocol that is used is too low, to increase the administrative distance, a static route should be used with the default static route administrative distance value e) None of the above cases a static route can be used.
a. Learning, Forwarding Note: The switch removes unused MAC address entries during the listening state.
In which spanning-tree states does a switch port learn MAC addresses? a. Learning, Forwarding b. Learning, Listening c. BPDU-exchanging, Learning d. Forwarding, Listening e. None of the above
a. 32768:11.22.33.44.55.66
Of the four switches listed below, which switch would STP choose to become the root bridge in the selection process? a. 32768:11.22.33.44.55.66 b. 32768:22.33.44.55.66.77 c. 32769:11.22.33.44.55.65 d. 32769:22.33.44.55.66.78
c. This switch interface has a higher path cost to the root bridge than another in the topology
Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, after the following command is issued: Switch# show spanning-tree interface fastethernet0/10. What is the most likely reason that interface FastEthernet 0/10 is not the root port for VLAN 2? a. This switch has more than one interface connected to the root network segment in VLAN b. This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree c. This switch interface has a higher path cost to the root bridge than another in the topology d. This switch has a lower bridge ID for VLAN 2 than the elected designated switch
e) In the routing table and topology table. A successor is the route with the best metric to reach a destination and stored in the routing table. A feasible successor is a backup path to reach that same destination that can be used immediately if the successor route fails. These backup routes are stored in the topology table.
Router R1 is running EIGRP. In which table(s) are EIGRP successor routes stored in this router? a) In the routing table only. b) In the neighbor table only. c) In the topology table only. d) In the routing table and neighbor table. e) In the routing table and topology table.
d) 90
Router R1 is running EIGRP. What is the default administrative distance (AD) of this protocol? a) 120 b) 110 c) 100 d) 90 e) 80
c) 100
Router R1 is running IGRP. What is the default administrative distance (AD) of this protocol? a) 120 b) 110 c) 100 d) 90 e) 80
b) 110
Router R1 is running OSPF. What is the default administrative distance (AD) of this protocol? a) 120 b) 110 c) 100 d) 90 e) 80
a) 120
Router R1 is running RIP. What is the default administrative distance (AD) of this protocol? a) 120 b) 110 c) 100 d) 90 e) 80
b. bridge priority e. MAC address
Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two) a. amount of RAM b. bridge priority c. IOS version d. IP address e. MAC address f. speed of the links
b) Choose based on the lowest neighbor bridge ID, port priority, neighbor internal port number
Switches need a tiebreaker to use in case the best root cost ties for two or more paths. If a tie occurs, which of the following is the order to determine the root port on the switch? a) Choose based on the lowest port priority, neighbor bridge ID, neighbor internal port number b) Choose based on the lowest neighbor bridge ID, port priority, neighbor internal port number c) Choose based on the lowest neighbor internal port number, neighbor bridge ID, neighbor port priority d) Choose based on the lowest neighbor bridge ID, neighbor internal port number, eighbor port priority
c) 3
The display below shows the output of show ip eigrp topology command on a Cisco router. Based on the information given in the display, how many broadcast domains exist in this EIGRP network? a) 6 b) 1 c) 3 d) 2 e) 5
c) Network 129.7.12.0 Note: If a wildcard mask is not specified in the network command, the specified network address should be a classful network address.
The information provided below belongs to a Cisco router which is configured for EIGRP using a single "network" statement in EIGRP configuration. Based on the given information, which of the given network statements is the one that has been used in the configuration? a) Network 129.7.12.0 0.0.0.255 b) Network 129.7.12.0 0.0.0.255 area 0 c) Network 129.7.12.0 d) Network 129.7.13.0 0.0.1.255 e) None of the above is correct
a) If RIPv2 is the routing protocol, two equal cost paths R1-R2-R4 and R1-R3-R4 will be used by default
The network given below uses subnets of 172.16.0.0/16 class B address. In this network you are considering to use RIPv2 or OSPF or EIGRP as the routing protocols. Based on those different routing protocol choices, router R1 may route packets from Net X to Net Y differently.Read the choices given below carefully. One of the choices may be wrong. If there is a wrong choice, determine which choice is the wrong one. All serial links are T1 except for 56 Kbps link in the middle. a) If RIPv2 is the routing protocol, two equal cost paths R1-R2-R4 and R1-R3-R4 will be used by default b) If EIGRP and OSPF are both running on the network, the EIGRP paths will be installed in the routing table c) If EIGRP is the routing protocol, two equal cost paths R1-R2-R4 and R1-R3-R4 will be used by default d) If RIPv2 and OSPF are both running on the network, the OSPF paths will be installed in the routing table e) All of the above statements are correct
a. Switch1(config-if)# switchport port-security violation shutdown c. Switch1(config-if)# switchport port-security maximum 1
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two) a. Switch1(config-if)# switchport port-security violation shutdown b. Switch1(config)# mac-address-table secure c. Switch1(config-if)# switchport port-security maximum 1 d. Switch1(config)# access-list 10 permit ip host e. Switch1(config-if)# ip access-group 10
b. Switch1(config-if)# switchport port-security mac-address sticky e. Switch1(config-if)# switchport port-security violation restrict
The network security policy requires that the switch interface dynamically learns the device and if the policy is violated, the interface should restricted. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two) a. Switch1(config-if)# switchport port-security violation protect b. Switch1(config-if)# switchport port-security mac-address sticky c. Switch1(config-if)# switchport port-security maximum 1 d. Switch1(config-if)# switchport port-security sticky e. Switch1(config-if)# switchport port-security violation restrict
d) Both b and c
The network shown below belongs to a small company which is using 192.168.17.0/24 class C address. In the network all routers are Cisco routers. Number of hosts in each location is also provided in the given network. Which of the stated routing protocols below can be used for this network? a) RIPv1 b) EIGRP c) RIPv2 d) Both b and c e) All three protocols can be used
d) A default route on R1 and a static route on R-ISP
The network shown below consists of a small office with 36 computers that has one connection to the Internet through R1 router. What route configurations are needed at R1 and R-ISP routers? a) RIP on R1 and EIGRP on R_ISP b) OSPF with two areas on both routers c) Default routes on both routers d) A default route on R1 and a static route on R-ISP e) None of the above will work
b) Statements S2, S5 and S6 are correct
The output command show spanning-tree vlan 30 is generated on a Cisco switch as shown below. Which of the following statements will be true about this switch? a) Statements S1, S2 and S5 are correct b) Statements S2, S5 and S6 are correct c) Statements S1, S3 and S4 are correct d) Statements S3, S4 and S6 are correct e) None of the above statements is correct
b) The keep routing tables small d) The allow connectivity to remote networks that are not in the routing table
What are some of the advantages of using default routes? (Choose two answers) a) They establish routes that will never go down b) They keep routing tables small c) They require a great deal of CPU power d) The allow connectivity to remote networks that are not in the routing table e) They direct traffic from the Internet into corporate networks
c) OSPF supports VLSM d) OSPF routes between areas in an autonomous system
What are some of the characteristics of OSPF routing protocol? (Select all valid answer choices) a) OSPF converges more slowly than RIPv2 b) OSPF best route computation algorithm is called Bellman-Ford Algorithm c) OSPF supports VLSM d) OSPF routes between areas in an autonomous system e) OSPF allows network sizes of up to 15 hops diameter
d. All switch and bridge ports are in either the forwarding or blocking state
What are the switch and bridge port characteristics of a layer two spanning-tree network that is fully converged? a. All switch and bridge ports are in the forwarding state b. All switch and bridge ports are in the stand-by state c. All switch and bridge ports are assigned as either root or designated ports d. All switch and bridge ports are in either the forwarding or blocking state e. All switch and bridge are either blocking or looping
d) The ability to support multi-vendor routers e) The ability to create a hierarchical design using areas
What are two benefits of using OSPF instead of EIGRP? (Choose two answers) a) The ability to automatically summarize networks b) The ability to redistribute default and static routes c) The ability to use VLSM d) The ability to support multi-vendor routers e) The ability to create a hierarchical design using areas
c. In PAT, the keyword "overload" must be used during configuration.
What is an important difference between Cisco dynamic NAT and Cisco PAT configurations? a. In dynamic NAT when the number of available IP addresses is exceeded, excess traffic will use static NAT. b. In dynamic NAT the pool of IP addresses must always be the same as the private IP addresses. c. In PAT, the keyword "overload" must be used during configuration. d. Whereas an ACL must be used in PAT, this is not needed in dynamic NAT. e. Whereas an ACL must be used in dynamic NAT, this is not needed in PAT.
a) E-ACLs should be placed as close to source and S-ACLs should be placed as close to destination possible.
When applying ACLs to router interfaces for the traffic that needs to be denied, which one of the following choices is correct in terms of placement of Standard ACLs (S-ACLs) and Extended ACLs (E- ACLs)? a) E-ACLs should be placed as close to source and S-ACLs should be placed as close to destination possible. b) S-ACLs should be placed as close to source and E-ACLs should be placed as close to destination possible. c) Both S-ACLs and E-ACLs should be placed as close to the source possible. d) Both S-ACLs and E-ACLs should be placed as close to the destination possible. e) None of the choices given above is correct
b. A switch is a multiport bridge c. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received
When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? (Choose all valid answer choices) a. Bridges are faster than switches because they have fewer ports b. A switch is a multiport bridge c. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received d. A bridge will forward a broadcast but a switch will not e. Bridges and switches increase the size of a collision domain f. None of the above statements are true
b) OSPF
Which routing protocol uses bandwidth and delay as metrics, by default? a) EIGRP b) OSPF c) RIPv1 d) RIPv2 e) None of the above
a. spanning-tree mode rapid-pvst
Which command enables RSTP on a switch? a. spanning-tree mode rapid-pvst b. spanning-tree uplinkfast c. spanning-tree backbonefast d. spanning-tree mode mst
b) Router(config-router)# network 192.168.10.0 0.0.0.255 area 0
Which of the following OSPF commands, when used together, will put the network 192.168.10.0/24 into OSPF area 0? a) Router(config-router)# network 192.168.10.0 0.0.0.255 0 b) Router(config-router)# network 192.168.10.0 0.0.0.255 area 0 c) Router(config-router)# network 192.168.10.0 255.255.255.0 area 0 d) Router(config)# router area 0 network 192.168.10.0 255.255.255.0 e) None of the above will work
b) Router(config) # ip subnet-zero Note: IP subnet zero command allows using the first and last subnet for addressing. If enabled, network addresses such as 192.168.1.192 are allowed.
Which of the following configuration command must be in effect to allow the use of 8 subnets in a Class C subnet with the subnet mask 255.255.255.224? a) Router(config) # ip classes b) Router(config) # ip subnet-zero c) Router(config) # ip unnumbered d) Router(config) # ip allzero-allone-subnets e) Router(config) # ip allsubnets
d) Hold-down timers e) Split horizon Note: Poison Reverse Method also prevents routing loops.
Which of the following technologies can be used in distance vector routing protocols to prevent routing loops? (Choose two answers) a) Spanning Tree Protocol b) Shortest path first tree c) Link-state advertisements (LSA) d) Hold-down timers e) Split horizon
a) EIGRP protocol with all the default settings Note: When auto-summary is enabled, routes are summarized to the classful boundary in the routing updates.
Which of the given choices below will create problems in the network shown below? a) EIGRP protocol with all the default settings b) OSPF protocol with all the default settings c) Static routes on all routers d) RIPv2 with autosummaries turned off e) All of the above mentions will work in the given network
d) R1 #show ip eigrp neighbors
Which one of the following EIGRP commands can be used to check the IP addresses other neighbor routers? a) R1 #show ip eigrp adjacency b) R1 #show ip eigrp topology c) R1 #show ip eigrp interfaces d) R1 #show ip eigrp neighbors e) None of the above
c. spanning-tree portfast
Which one of the following commands improves the 802.1d convergence time on ports that are connected to hosts? a. spanning-tree backbonefast b. spanning-tree uplinkfast c. spanning-tree portfast d. spanning-tree cost 512
d) Bridge ID
Which one of the following is used by Spanning Tree Protocol to elect a root bridge? a) Bridge priority b) IP address c) MAC address d) Bridge ID e) Link speed
a) A successor route is used by EIGRP to forward traffic to a destination Note: A successor is the route with the best metric to reach a destination. That route is stored in the routing table. A feasible successor is a backup path to reach that same destination that can be used immediately if the successor route fails.
Which one of the following statements is true about EIGRP successor routes? a) A successor route is used by EIGRP to forward traffic to a destination b) Successor routes are saved in the topology table to be used if the primary route fails c) Successor routes are flagged as "backup" in the routing table d) Successor routes are stored in the neighbor table following the discovery process e) None of the above is true
a) It establishes a static route to the 172.16.3.0 network
Which one of the following statements is true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? a) It establishes a static route to the 172.16.3.0 network b) It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network c) It creates a static route to the 192.168.2.0 network d) It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4. It is a route that would be used last if other routes to the same destination exist e) None of the above statements is true.
b) They send entire routing table to all routers in the routing domain
Which one of the following statements is true about vector distance routing protocols? a) They converge faster than link state protocols b) They send entire routing table to all routers in the routing domain c) They use the shortest-path algorithm to the determine best path d) They update the routing table based on updates from their neighbors e) Maintain the topology map of the entire network in a database
d. Converged
Which one of the following terms describes a spanning-tree network that has all switch ports in either the blocking or forwarding state? a. Redundant b. Spanned c. Provisioned d. Converged
a) Because the EIGRP topology table displays all loop free routes to a destination
While you are examining the EIGRP topology table of a Cisco router, you notice that the table shows multiple unequal cost paths to a network 192.168.100.0/24. Why are there such multiple paths? a) Because the EIGRP topology table displays all loop free routes to a destination b) Because the EIGRP toplogy table is responsible for displaying only the backup routes to a destination c) Unequal paths are displayed because "variance" was configured in this EIGRP router d) Because multiple floating static routes were configured to 192.168.100.0/24 network e) None of the above is correct
c) OSPF Note: The scalability of the OSPF is higher than EIGRP because EIGRP is complicated, vendor-specific, and incapable of migrating from one vendor to the other.
You are the designer of the network for a company which is expected to grow rapidly into USA and Europe. For this purpose you would like to choose a routing protocol that supports scalability and VLSM. It is also expected that company will use routers from different vendors. Based on the given information, which of the given routing protocols should be used? a) RIP version 1 b) RIP version 2 c) OSPF d) EIGRP e) both OSPF and EIGRP can be used
d) R1 fa0/0: use "S" R1 fa0/1: use "R" R2 fa0/0: use "Q" R2 s0/0: use "U"
You have received 192.168.151.0/24 to use as the addressing for the network shown below. You need to decide which addresses need to be assigned to the four router interfaces shown in the network diagram. You need to choose from the IP address the selections given below (designated by letters, P, Q, R, S, T, U, V) for those interfaces. a) R1 fa0/0: use "V" R1 fa0/1: use "T" R2 fa0/0: use "W" R2 s0/0: use "P" b) R1 fa0/0: use "R" R1 fa0/1: use "S" R2 fa0/0: use "W" R2 s0/0: use "U" c) R1 fa0/0: use "V" R1 fa0/1: use "T" R2 fa0/0: use "Q" R2 s0/0: use "P" d) R1 fa0/0: use "S" R1 fa0/1: use "R" R2 fa0/0: use "Q" R2 s0/0: use "U" e) None of the above is correct
b. A registered address that represents an inside host to an outside network.
You need to configure NAT on a Certkiller router that is connected to the Internet. To do so, you must determine what the Inside Global IP addresses will be. What does the "Inside Global" address represent in the configuration of NAT? a. The summarized address for all of the internal submitted addresses. b. A registered address that represents an inside host to an outside network. c. A globally unique, private IP address assigned to a host on the inside network. d. The MAC address of the router used by inside hosts to connect to the Internet E. None of the above.
c) EIGRP
You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which routing protocol can satisfy this requirement? a) RIPv1 b) RIPv2 c) EIGRP d) OSPF e) Static Routes
d) Use S4 for A1, S3 for A2 and S2 for A3
You work for a company called UHCL-MIS Gurus Inc. Your company has its headquarters in Houston. The company has a branch office in Dallas as shown in the figure below. Dallas office access the Internet through Houston network. You are responsible for implementing the ACLs in your network. In order to accomplish the Actions listed on the left side, which of the command selection options (given on the right) should you use? a) Use S1 for A1, S3 for A2 and S6 for A3 b) Use S4 for A1, S5 for A2 and S6 for A3 c) Use S1 for A1, S3 for A2 and S2 for A3 d) Use S4 for A1, S3 for A2 and S2 for A3 e) None of the given choices will accomplished the desired actions